apt-get Without --no-install-recommends
lowapt-get install without --no-install-recommends bloats images by 30-50% with unnecessary packages
apt-get install without --no-install-recommends bloats images by 30-50% with unnecessary packages
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --rule cpf/docker-apt-recommendsExplore related security rules for Docker
Detects Dockerfiles without USER instruction, causing containers to run with root privileges
Detects ARG instructions with names suggesting secrets. Build args are visible in image history
Detects Docker socket mount which gives container full control over host Docker daemon
Common questions about apt-get Without --no-install-recommends
Use Code Pathfinder to scan your Docker codebase and automatically detect instances of this vulnerability pattern. Install Code Pathfinder and run the following command in your project directory:
pathfinder scan --rule cpf/docker-apt-recommendsThis rule is aligned with industry-standard security frameworks and classifications: